Integrated Computer-Aided Engineering - Volume 17, issue 1

Purchase individual online access for 1 year to this journal.

Price: EUR 150.00

ISSN 1069-2509 (P)
ISSN 1875-8835 (E)

Impact Factor 2018: 3.667

The focus of ICAE is the integration of leading edge and emerging computer and information technologies for innovative solution of engineering problems. The journal fosters interdisciplinary research and presents a unique forum for innovative computer-aided engineering. It also publishes novel industrial applications of CAE, thus helping to bring new computational paradigms from research labs and classrooms to reality.

Abstract: A low-complexity algorithm for the computation of the geometrical moments of binary images has been developed and implemented on the limited CPU and RAM resources available in current low-cost on-chip CMOS cameras. This moment-based approach can be used to find the position and orientation of objects in the image plane, which has a wide range of applications from networked embedded robotics to the medical care field. In medical care applications it is envisioned that camera systems with on-chip processing algorithms, such as the one described in this paper, can be used to determine the posture of a human body, e.g.…standing or lying down. By processing only binary images on the camera chip and then transmitting numbers related to the geometrical moments, security and privacy concerns can be taken care using simple procedures. It is expected that this type of camera systems will work in conjunction with a wireless body area network (WBAN) that measures vital signs. The final goal is to provide cost effective and timely information to the medical personnel responsible for the care of the patients.
Show more

Abstract: In this paper, some modifications are introduced to the Original Hartley Transform (OHT) in an attempt to increase the resistance of the OHT against the cropping attack. The unique frequency pattern of the OHT triggered the proposed modifications, where the coefficients of the transformation kernel matrix are swapped to meet the requirements of the new transform. The Modified Hartley Transform (MHT) can be utilized in many signal and image applications; however, in this paper the main focus is on the cropping and filtering applications only. Two applications of the MHT are also presented in this paper. The first…(major) application is a new form of the Naturalness Preserving Transform (NPT) based on the MHT for hiding distinctive ownership identification information into sensitive data (i.e., remote sensing data). The new MHT-based NPT is more resilient to the cropping attack. Experimental results in this paper emphasize the capability of the MHT-based NPT to invisibly hide a digital signature into a host data, which also can be used for a secure data (image) transmission. The second (minor) application is a Cross-Like Shape L-Pass Filter (CLSLPF), which is mainly developed to suit the unique frequency pattern of the new MHT. This type of filter preserves the minimum number of the frequency components which holds the highest percentage of the input signal's energy. Experimental results are provided for comparison between the proposed CLSLPF and Butterworth low pass filter with a main focus on the total energy of the preserved frequency components.
Show more

Abstract: Modern fingerprint image compression and reconstruction standards used by the US Federal Bureau of Investigation (FBI) are based upon the popular biorthogonal 9-7 discrete wavelet transform. Multiresolution analysis tools have been successfully applied to fingerprint image compression for more than a decade; we propose a novel fingerprint image compression technique based on wave atoms decomposition and multistage vector quantization. Wave atoms decomposition has been specifically designed for enhanced representation of oscillatory patterns and to convey precise temporal and spatial information. Our proposed compression scheme is based upon multistage vector quantization of processed wave atoms representation of fingerprint images. Wave atoms…expansion is processed using mathematical morphological operators to emphasize and retain significant coefficients for transmission. Quantized information is encoded using arithmetic entropy scheme. The proposed image compression standard outperforms other well established methods and achieves PSNR gain up to 8.07 dB in comparison to FBI's wavelet scalar quantization. Data mining, law enforcement, border security, and forensic applications can potentially benefit from our compression scheme.
Show more

Abstract: We have been proposing the automatic human tracking system to overcome limitations of existing video surveillance systems. This paper proposes two bypass methods to keep tracking a targeted person by the system constructed by using mobile agent technologies even if unexpected problems are occurred. The proposed methods are called as “Recalculation Bypass Method” and “Additional Calculation Bypass Method”. These bypass methods utilize the algorithm which is elaborated in the paper, “An Algorithm to Determine Neighbor Nodes” [7]. The mobile agents are operating in automatic human tracking system and the bypass methods are utilized by the mobile agents. It is a…very important ability for the mobile agent not to lose tracking in automatic human tracking systems. The bypass methods contribute to the realization of robust system and resolve two classifications of problem to ensure the tracking ability of mobile agents. The two classifications of problem are logical and physical problems. In the case of logical problems, they occur inside the system and they are called as “broken server”. While in the case of physical problems, they occur outside the system and they are called as “pathway being modified”. This system is able to track the targeted person continuously by utilizing the methods even if unexpected problems are occurred. We confirmed the effectiveness of the proposed bypass methods by the experiments that used more than one broken servers and pathway being modified.
Show more

Abstract: In this paper, we introduce a new multi-bit watermarking method for speech signals in the joint time-frequency domain. For this purpose, we compute the Wigner distribution of the speech signal and embed the watermark in a subset of time-frequency cells. The problem of synthesizing the signal from the watermarked Wigner distribution is discussed and a simple algorithm to reconstruct the speech signal from its Wigner distribution is proposed. The performance of the proposed watermarking algorithm is illustrated for sample attacks.

Abstract: This paper presents an embedded implementation approach of land vehicle navigation involving a Multi Sensor System (MSS) consisting of a single-axis gyroscope and an odometer integrated with GPS receiver. With the assumption that the vehicle stays mostly in the horizontal plane, the vehicle speed obtained from the odometer measurements is decomposed into east and north velocities by using heading information from the gyroscope. Subsequently, the vehicle's position in latitude and longitude are determined. MSS errors are estimated by an integrated MSS/GPS Kalman filter (KF) which relies on a dynamic error model of position, velocity and heading as well as stochastic…models for gyroscope and odometer errors. In case of a GPS outage, the designed KF module provides positioning information. The decentralized KF algorithm is described in software and is executed on an embedded soft core processor containing a single precision floating point unit. Results were validated imposing numerous simulated GPS outages of varied lengths on road test trajectory data of GPS receiver, car chip odometer and single axis MEMS based gyro. The length of the simulated GPS outages varied from 36 s to 425 s on three different road trajectories. Results show a maximum positional error of 110 m for an outage of 120s duration and a minimum positional error of 14 m for an outage of 60 s duration with respect to the reference trajectory.
Show more